Search

Your search keyword '"CLOUD computing security measures"' showing total 1,156 results

Search Constraints

Start Over You searched for: Descriptor "CLOUD computing security measures" Remove constraint Descriptor: "CLOUD computing security measures"
1,156 results on '"CLOUD computing security measures"'

Search Results

1. Confidential Container Groups.

2. Why Should I Trust Your Code?

3. Creating the First Confidential GPUs.

4. Hardware VM Isolation in the Cloud.

5. An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing.

6. Extreme learning with projection relational algebraic secured data transmission for big cloud data.

7. Homomorphic technique for group data sharing in cloud computing environment.

8. Architectural Design for Data Security in Cloud-based Big Data Systems.

9. Dynamic security in cloud computing based on fuzzy cognitive maps.

10. REVOLUTIONIZING CLOUD SECURITY: A NOVEL FRAMEWORK FOR ENHANCED DATA PROTECTION IN TRANSMISSION AND MIGRATION.

11. Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing.

12. EdgeAuth: An intelligent token‐based collaborative authentication scheme.

13. Deep learning for cloud storage security: A systematic review.

14. A non-redundant cost-effective platform and data security in cloud computing using improved lightweight standalone framework over data encryption standard algorithm.

15. Design of a mathematical fusion model for enhanced cloud data security.

16. A systematic review on blockchain-based access control systems in cloud environment.

17. Domain knowledge free cloud-IDS with lightweight embedding method.

18. PRC6: Hybrid lightweight cipher for enhanced cloud data security in parallel environment.

19. Evading Cyber-Attacks on Hadoop Ecosystem: A Novel Machine Learning-Based Security-Centric Approach towards Big Data Cloud.

20. Cloud Computing Security: Assured Deletion.

21. EXPLORING THE SECURITY OF CLOUD COMPUTING: AN ANALYSIS OF THREATS AND COUNTERMEASURES FOR CLOUD COMPUTING IN THE ERA OF DIGITAL TRANSFORMATION.

22. Design and optimization strategy of electricity marketing information system supported by cloud computing platform.

23. Trust value evaluation of cloud service providers using fuzzy inference based analytical process.

24. Big-IDS: a decentralized multi agent reinforcement learning approach for distributed intrusion detection in big data networks.

25. A Novel Approach Using Enhanced Five Divisors Data Deduplication Method Secure Cloud Storage Optimization.

26. Advanced Cybersecurity Strategies in Cloud Computing: Techniques for Data Protection and Privacy.

27. Blockchain‐cloud integration: Comprehensive survey and open research issues.

28. Security Validation in OpenStack: A Comprehensive Evaluation.

29. WIZ Kid.

30. Security techniques in cloud computing.

31. Securing the cloud: An in-depth review of security threats in cloud computing.

32. Cloud computing security challenges and related mitigation strategies.

33. A review on cloud computing security challenges, attacks and its countermeasures.

34. Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things.

35. The Usage of Clouds in Zero-Trust Security Strategy: An Evolving Paradigm.

36. Cloud Data Leakage, Security, Privacy Issues and Challenges: Review.

37. Generative adversarial networks-based security and applications in cloud computing: a survey.

38. Performance of Secure Framework AES Algorithm using Cloud Computing.

39. Cyber threats to the Private Academic Cloud.

40. Cloud Security Using Fine-Grained Efficient Information Flow Tracking.

41. AN EFFICIENT SECURITY ROUTING PROTOCOL FOR CLOUD-BASED NETWORKS USING CISCO PACKET TRACER.

42. Close: A survey on cloud security issues.

43. A novel multi-scale CNN and Bi-LSTM arbitration dense network model for low-rate DDoS attack detection.

44. The Interplay of IT Governance Mechanisms, Value and Performance: The Case of Cloud Computing Investment.

45. ENHANCED FEATURE OPTIMIZATION FOR MULTICLASSS INTRUSION DETECTION IN IOT FOG COMPUTING ENVIRONMENTS.

46. An Enhanced D Level Cut-Off Point-Quantum Secret Sharing Access Structure Scheme Based Efficient Monitoring Key Ciphertext Attributes with Encryption Access Control with Blockchain and Key Mechanism for Security in Cloud Computing.

47. Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing.

48. Machine learning-enhanced hybrid cryptography and image steganography algorithm for securing cloud data.

49. Amenazas emergentes en la computación en la nube: desafíos de seguridad y respuesta.

50. Cloud Computing Security and Deep Learning: An ANN approach.

Catalog

Books, media, physical & digital resources